how to create log-in macros - automatebpos.comautomatebpos.com/createlogins.pdf · how to create...

4
Page 1 of 4 PO Box 1325, Ferndale, WA 98248 http://www.bpo-automation.com Phone: (360) 223-2482 [email protected] How to Create Log-In Macros The first step you want to take (of course I am already assuming that you have either purchased iMacro or downloaded either the free trial or the freeware version) is to: 1. Open a new Internet Explorer browser. 2. Enter the website address of the BPO or REO company you want to create a log-in macro for. The example I will use will be to go to Landsafe/Bank of America’s website, which is: https://epass.landsafe.com/val/login 3. Go ahead and put in your log into information into the website before recording your ‘log-in’ macro. 4. Open the iMacros player by clicking on the icon that is located on the tool bar within your browser so that is looks like the image below.

Upload: truongque

Post on 17-Sep-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1 of 4 PO Box 1325, Ferndale, WA 98248

http://www.bpo-automation.com

Phone: (360) 223-2482

[email protected]

How to Create Log-In Macros

The first step you want to take (of course I am already assuming that you have either

purchased iMacro or downloaded either the free trial or the freeware version) is to:

1. Open a new Internet Explorer browser.

2. Enter the website address of the BPO or REO company you want to create a log-in

macro for.

The example I will use will be to go to Landsafe/Bank of America’s website, which is: https://epass.landsafe.com/val/login

3. Go ahead and put in your log into information into the website before recording your

‘log-in’ macro.

4. Open the iMacros player by clicking on the icon that is located on the tool bar within

your browser so that is looks like the image below.

Page 2 of 4 PO Box 1325, Ferndale, WA 98248

http://www.bpo-automation.com

Phone: (360) 223-2482

[email protected]

5. Select the “Rec” tab that is within the iMacro player. It is right next to the Play tab and is

sandwiched in between the Edit tab.

6. Next click on the “Record” button. You will now see that your recording has started

within the iMacros browser.

7. Now, with your mouse go ahead and click on the box that has your username and your

password. A blue box will appear around your username and your password (this means

that this information got recorded within your new macro)

Page 3 of 4 PO Box 1325, Ferndale, WA 98248

http://www.bpo-automation.com

Phone: (360) 223-2482

[email protected]

8. Next click on anything that pops up that you want recorded in your ‘log in’ macro. Typically, I’d record everything up to the point of getting to the queue where all of the orders are. Go ahead and now click on the “Stop” button that is on the Rec tab.

9. You will see a temporary macro appear in the iMacros player window. The file is called #Current. You must save this macro by renaming it.

10. To save and rename your new macro click on the “Save” button within the Rec tab.

Page 4 of 4 PO Box 1325, Ferndale, WA 98248

http://www.bpo-automation.com

Phone: (360) 223-2482

[email protected]

11. You new log in macro is ready to test out. Double click on the macro that you want to

run. You can also click on the play button within the “Play” tab.

12. Go ahead and create many more log-in macros. So that you can automate as many log-ins as you can.

As you see below, this is the code that is created when you record a log-in macro. Check out the

password part, if you would notice that the password is encrypted. When you record a log-in

macro using iMacros software, your password is always safe and always will be encrypted.

After showing you all of this, wouldn’t it be nice if we could get away with just having to walk

through life only having to memorize just one username and one password for everything? That

would be something else, would it?!?! Fortunately and unfortunately, we live in a time where

information is so powerful, that it can be used to help make our lives easier and at the same

time it can be used to complicate our lives to the point of having our individual trust in

computers, and the internet shattered forever.

I hope that you are able to stay on the somewhat

trusting but educated side of technology. Plus, I hope

you find my suggestions to be used as tools into how

to protect yourself and your information.

Thank you for indulging me for a moment!